default search action
NOF 2013: Pohang, South Korea
- Fourth International Conference on the Network of the Future, NOF 2013, Pohang, Korea (South), October 23-25, 2013. IEEE 2013, ISBN 978-1-4799-1643-6
- Masayoshi Shimamura, Hiroaki Yamanaka, Yoshiyuki Uratani, Akira Nagata, Shuji Ishii, Katsuyoshi Iida, Eiji Kawai, Masato Tsuru:
Architecture for resource controllable NVE to meet service providers' dynamic QoS demands. 1-6 - Jian Li, Jin Xiao, Huu Nhat Minh Nguyen, James Won-Ki Hong, Raouf Boutaba:
BreezChirp: Energy efficient Wi-Fi bandwidth estimator for smartphones. 1-5 - Jihoon An, Younggi Kim, Minseok Lee, Younghee Lee:
Ontology Property-based Adaptive Crawler for Linked Data(OPAC). 1-6 - Kevin Gatimu, Ben Lee, Tae-Wook Lee, Chang-Gone Kim, Jone-Keun Shin:
Weighted nearest valid motion vector averaging for spatial motion vector recovery in wireless HD video transmission using H.264 over WLANs. 1-6 - Marc Körner, Alexander Stanik, Andreas Kliem:
An approach for QoS constraint networks in cloud environments. 1-3 - Jae-Pil Jeong, Young Deok Park, Young-Joo Suh:
Handoff performance enhancement scheme for multi-interface enterprise WLANs. 1-5 - Kaliappa Ravindran, Mohammad Rabby:
Software cybernetics to infuse adaptation intelligence in networked systems. 1-6 - Waixi Liu, Shun-Zheng Yu, Ping-Yu Zhu:
Multisource dissemination in content-centric networking. 1-5 - Sangwook Bak, Seokseong Jeon, Young-Joo Suh, Chansu Yu, Dongsoo Han:
Characteristics of a large-scale WiFi radiomap and their implications in indoor localization. 1-5 - Michael Grieger, Gerhard P. Fettweis:
Field trial results on a cooperative small cell feeder uplink using six-fold sectorization. 1-6 - Marc Koerner, Odej Kao:
Optimizing openflow load-balancing with L2 direct server return. 1-5 - Marc Koerner, Herbert Almus:
HLA - A hierarchical layer application for OpenFlow management abstraction. 1-4 - Jie Li, Andreas Aurelius, Manxing Du, Hantao Wang, Åke Arvidsson, Maria Kihl:
Youtube traffic content analysis in the perspective of clip category and duration. 1-5 - Taeyeol Jeong, James Won-Ki Hong:
Content-centric networking for telematics services. 1-3 - Woojoong Kim, Young-Joo Suh:
Enhanced adaptive periodic mobility load balancing algorithm for LTE femtocell networks. 1-5 - Fouad Amine Guenane, Pierre-Yves Dumas, Michele Nogueira, Guy Pujolle:
Solving virtual network resource allocation problems using a constraint satisfaction problem model. 1-5 - Cao Vien Phung, Thuong Van Vu, Thi Mai Trang Nguyen:
DCAR coding gain modeling and analysis. 1-3 - Wei You, Bertrand Mathieu, Gwendal Simon:
How to make content-centric networks interwork with CDN networks. 1-5 - Ines Ayadi, Gladys Diaz, Noemie Simoni:
QoS-based network virtualization to future networks: An approach based on network constraints. 1-5 - Jérôme François, Thibault Cholez, Thomas Engel:
CCN traffic optimization for IoT. 1-5 - Gwo-Jong Yu:
A fuzzy adaptive DRX power saving mechanism for LTE-Advanced networks. 1-5 - Hyo-Ryun Lee, Kyoung-Hak Jung, Young-Joo Suh:
A contention/collision resolution scheme for large-scale sensor networks based on IEEE 802.15.4. 1-3 - Fatima Zahra Errounda, Fatna Belqasmi, Roch H. Glitho:
Towards cloud-based architectures for robotic applications provisioning. 1-3 - Young Deok Park, Kyoung-Hak Jung, Young-Joo Suh:
Improving IEEE 802.11 PSM for smartphones by exploiting Hidden Tail-time. 1-3 - Jungim Kim, Tae-Ho Lee, Heeyoung Jung:
Flat identifier to locator mapping scheme in the global internet. 1-5 - Jaegook Lee, Young-Joo Suh, Chansu Yu:
Evaluation on enterprise WLAN techniques. 1-3 - Yue Wu, Zhangyin Qian, Michel Riguidel, Gongliang Chen:
CogTag: Cognitive tags framework for new generation Internet beyond IP & MPLS. 1-4 - Byoungheon Shin, Seon-Yeong Han, Dongman Lee, Wonyong Yoon:
Application-awareness support for QoS-aware routing protocols in wireless ad-hoc networks. 1-5 - Gyuyeong Kim, Wonjun Lee:
Cannot take my allocation: Enforcing fairness by considering demand and payment in clouds. 1-5 - Irfan Simsek, Martin Becke, Yves Igor Jerschow, Erwin P. Rathgeb:
A clean-slate security vision for future networks: Simultaneously ensuring information security and establishing smart in-network services using the example of blind packet forwarding. 1-5 - C. P. Gupta, Iti Sharma:
A fully homomorphic encryption scheme with symmetric keys with application to private data processing in clouds. 1-4 - Young-min Park, Jong Kim, Yoonho Kim:
Distributed certificate authority scheme with weighted secret sharing for mobile ad-hoc networks. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.